Network Security
Impact analysis
Entity systems generate information that is reviewed and evaluated to determine impacts on the functioning of internal controls.
Limit Network Connections
Entity ensures that the production databases access and Secure Shell access to infrastructure entities are protected from public internet access.
Transmission Confidentiality
Entity has set up processes to utilize standard encryption methods, including HTTPS with the TLS algorithm, to keep transmitted data confidential.
Anomalous Behavior
Entity's infrastructure is configured to review and analyze audit events to detect anomalous or suspicious activity and threats
Capacity & Performance Management
Entity has set up methods to continuously monitor critical assets to generate capacity alerts to ensure optimal performance, meet future capacity requirements, and protect against denial-of-service attacks.
Data used in Testing
Entity ensures that customer data used in non-Production environments requires the same level of protection as the production environment.
Centralized Collection of Security Event Logs
Entity's infrastructure is configured to generate audit events for actions of interest related to security for all critical systems.